Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. However, there are problems associated with these picture-based password authentication systems such as: vulnerability to security threats, and users’ memorability of t...
Similar Items
Electronic Questionnaire /Por Lip Yee
by: Por , Lip Yee
Published: (2001)
by: Por , Lip Yee
Published: (2001)
Electronic questionnaire / Por Lip Yee
by: Por, Lip Yee
Published: (2001)
by: Por, Lip Yee
Published: (2001)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
Camouflage cursor anti-shoulder surfing technique
by: Teng, Sin Liang
Published: (2015)
by: Teng, Sin Liang
Published: (2015)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Substandard and falsified medicines in the UK: a
retrospective review of drug alerts (2001-2011)
by: Almuzaini, Tariq, et al.
Published: (2013)
by: Almuzaini, Tariq, et al.
Published: (2013)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
The Cultural Authenticity Of Visual Narratives In Children’S Picture Books In China
by: Qi, Fenfen
Published: (2024)
by: Qi, Fenfen
Published: (2024)
Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Talk and surf more for less
Published: (2008)
Published: (2008)
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017)
by: Chegenizadeh, Amin, et al.
Published: (2017)
Cellular response to PorA-Loop4-derived peptides of Neisseria meningitidis
by: Firdaus, Rininta
Published: (2019)
by: Firdaus, Rininta
Published: (2019)
Income Tax Preparation System / Ku Seng Lip
by: Ku, Seng Lip
Published: (2001)
by: Ku, Seng Lip
Published: (2001)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Wind/wave interactions in the surf zone
by: King, Daniel Martin.
Published: (1994)
by: King, Daniel Martin.
Published: (1994)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
Surfing with sound: an ethnography of the art of no-input mixing
by: Chamberlain, Alan
Published: (2018)
by: Chamberlain, Alan
Published: (2018)
Review of Joe Hajdu, Samurai in the Surf (2005)
by: Morris, Narrelle
Published: (2005)
by: Morris, Narrelle
Published: (2005)
Similar Items
-
Electronic Questionnaire /Por Lip Yee
by: Por , Lip Yee
Published: (2001) -
Electronic questionnaire / Por Lip Yee
by: Por, Lip Yee
Published: (2001) -
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010) -
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018) -
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)